Course description
In this course for the CompTIA A+ 1001-1002 exam, we’ll talk about corporate security policies and filing security incident reports. We’ll also cover strong password and other common security policies and how to educate user about them. Also covered are ways to keep workstations secure. Having this information in your arsenal of tools not only will make you a better technician, it can also help with security in your home network.
Prerequisites
This course assumes the user has little to experience with computer hardware or software.
Learning Paths
This course will help you prepare for the following certification and exam:
CompTIA A+ Certification
Meet the experts
A lifelong fascination with technology led a varied career in technology. I have over 20 years of experience supporting end users, and small businesses. On top of that, I have been an Information Technology instructor for Edmonds Community College, where I instructed on CompTIA’s A+, and Network+ material. During that time I created curriculum for not only those courses, but also for CompTIA’s Security+ certification. I currently hold the following certifications: A+, Network+, Server+, Cloud+, and Project+.
Chuck Nailen has been providing classroom training for more than 16 years. He does training for in department-supported CompTIA curriculums, Microsoft curriculums, and Department of State (DoS) proprietary platforms in support of SAIT and DoS programs. He holds many certifications including National Career Readiness Certificate-Gold Level, MCSA, MCT, MCITP, MCTS, and others.
Course outline
Security
Security Fundamentals (16:14)
- Introduction (00:21)
- Corporate Security Policies (00:59)
- Security Incident Reports (01:03)
- Principle of Least Privilege (02:15)
- Strong Passwords (01:42)
- User Education (00:40)
- Common User Security Practices (06:13)
- Authentication Methods (01:41)
- Biometric Authen. Methods (00:57)
- Summary (00:18)
Threats and Vulnerabilities (13:34)
- Introduction (00:20)
- Malware (00:34)
- Types of Malware (03:02)
- Social Engineering (00:24)
- Types of Social Engineering (04:44)
- Threats & Vulnerabibilities (01:33)
- Common Wireless Sec. Threats (02:29)
- Summary (00:23)
Security Protection Measures (19:09)
- Introduction (00:22)
- Physical Security (02:30)
- Physical Security Measures (03:32)
- Digital Security (00:19)
- Antivirus Software (00:18)
- Anti-Spyware Software (00:27)
- Firewalls (00:25)
- Social Engineering Prevention (00:21)
- Hard Drive Sanitation (00:57)
- Hard Drive Disposal (00:42)
- Physical Destruction Methods (00:27)
- Windows Security Policies Introduction (01:14)
- Domains (01:51)
- Organizational Units (01:58)
- Group Policies (01:27)
- Other AD Features (01:50)
- Summary (00:20)
Workstation Secuity (07:57)
- Introduction (00:18)
- Windows Security Policies (00:38)
- Windows Firewall (01:57)
- Software Firewall Conf Setting (02:27)
- Workstation Security Best Practices (02:21)
- Summary (00:13)